|
| 1 | +From 09246e73df900b96b534d6b7ccd26a681facb4d5 Mon Sep 17 00:00:00 2001 |
| 2 | +From: Vadim Pasternak < [email protected]> |
| 3 | +Date: Tue, 26 Nov 2019 09:09:45 +0200 |
| 4 | +Subject: [PATCH backport bugfix from v5.3] thermal: Fix use-after-free when |
| 5 | + unregistering thermal zone device |
| 6 | + |
| 7 | +Upstream commit 1851799e1d2978f68eea5d9dff322e121dcf59c1 |
| 8 | +Author: Ido Schimmel < [email protected]> |
| 9 | +Date: Wed Jul 10 13:14:52 2019 +0300 |
| 10 | + |
| 11 | +thermal: Fix use-after-free when unregistering thermal zone device |
| 12 | + |
| 13 | +thermal_zone_device_unregister() cancels the delayed work that polls the |
| 14 | +thermal zone, but it does not wait for it to finish. This is racy with |
| 15 | +respect to the freeing of the thermal zone device, which can result in a |
| 16 | +use-after-free [1]. |
| 17 | + |
| 18 | +Fix this by waiting for the delayed work to finish before freeing the |
| 19 | +thermal zone device. Note that thermal_zone_device_set_polling() is |
| 20 | +never invoked from an atomic context, so it is safe to call |
| 21 | +cancel_delayed_work_sync() that can block. |
| 22 | + |
| 23 | +[1] |
| 24 | +[ +0.002221] ================================================================== |
| 25 | +[ +0.000064] BUG: KASAN: use-after-free in __mutex_lock+0x1076/0x11c0 |
| 26 | +[ +0.000016] Read of size 8 at addr ffff8881e48e0450 by task kworker/1:0/17 |
| 27 | + |
| 28 | +[ +0.000023] CPU: 1 PID: 17 Comm: kworker/1:0 Not tainted 5.2.0-rc6-custom-02495-g8e73ca3be4af #1701 |
| 29 | +[ +0.000010] Hardware name: Mellanox Technologies Ltd. MSN2100-CB2FO/SA001017, BIOS 5.6.5 06/07/2016 |
| 30 | +[ +0.000016] Workqueue: events_freezable_power_ thermal_zone_device_check |
| 31 | +[ +0.000012] Call Trace: |
| 32 | +[ +0.000021] dump_stack+0xa9/0x10e |
| 33 | +[ +0.000020] print_address_description.cold.2+0x9/0x25e |
| 34 | +[ +0.000018] __kasan_report.cold.3+0x78/0x9d |
| 35 | +[ +0.000016] kasan_report+0xe/0x20 |
| 36 | +[ +0.000016] __mutex_lock+0x1076/0x11c0 |
| 37 | +[ +0.000014] step_wise_throttle+0x72/0x150 |
| 38 | +[ +0.000018] handle_thermal_trip+0x167/0x760 |
| 39 | +[ +0.000019] thermal_zone_device_update+0x19e/0x5f0 |
| 40 | +[ +0.000019] process_one_work+0x969/0x16f0 |
| 41 | +[ +0.000017] worker_thread+0x91/0xc40 |
| 42 | +[ +0.000014] kthread+0x33d/0x400 |
| 43 | +[ +0.000015] ret_from_fork+0x3a/0x50 |
| 44 | + |
| 45 | +[ +0.000020] Allocated by task 1: |
| 46 | +[ +0.000015] save_stack+0x19/0x80 |
| 47 | +[ +0.000015] __kasan_kmalloc.constprop.4+0xc1/0xd0 |
| 48 | +[ +0.000014] kmem_cache_alloc_trace+0x152/0x320 |
| 49 | +[ +0.000015] thermal_zone_device_register+0x1b4/0x13a0 |
| 50 | +[ +0.000015] mlxsw_thermal_init+0xc92/0x23d0 |
| 51 | +[ +0.000014] __mlxsw_core_bus_device_register+0x659/0x11b0 |
| 52 | +[ +0.000013] mlxsw_core_bus_device_register+0x3d/0x90 |
| 53 | +[ +0.000013] mlxsw_pci_probe+0x355/0x4b0 |
| 54 | +[ +0.000014] local_pci_probe+0xc3/0x150 |
| 55 | +[ +0.000013] pci_device_probe+0x280/0x410 |
| 56 | +[ +0.000013] really_probe+0x26a/0xbb0 |
| 57 | +[ +0.000013] driver_probe_device+0x208/0x2e0 |
| 58 | +[ +0.000013] device_driver_attach+0xfe/0x140 |
| 59 | +[ +0.000013] __driver_attach+0x110/0x310 |
| 60 | +[ +0.000013] bus_for_each_dev+0x14b/0x1d0 |
| 61 | +[ +0.000013] driver_register+0x1c0/0x400 |
| 62 | +[ +0.000015] mlxsw_sp_module_init+0x5d/0xd3 |
| 63 | +[ +0.000014] do_one_initcall+0x239/0x4dd |
| 64 | +[ +0.000013] kernel_init_freeable+0x42b/0x4e8 |
| 65 | +[ +0.000012] kernel_init+0x11/0x18b |
| 66 | +[ +0.000013] ret_from_fork+0x3a/0x50 |
| 67 | + |
| 68 | +[ +0.000015] Freed by task 581: |
| 69 | +[ +0.000013] save_stack+0x19/0x80 |
| 70 | +[ +0.000014] __kasan_slab_free+0x125/0x170 |
| 71 | +[ +0.000013] kfree+0xf3/0x310 |
| 72 | +[ +0.000013] thermal_release+0xc7/0xf0 |
| 73 | +[ +0.000014] device_release+0x77/0x200 |
| 74 | +[ +0.000014] kobject_put+0x1a8/0x4c0 |
| 75 | +[ +0.000014] device_unregister+0x38/0xc0 |
| 76 | +[ +0.000014] thermal_zone_device_unregister+0x54e/0x6a0 |
| 77 | +[ +0.000014] mlxsw_thermal_fini+0x184/0x35a |
| 78 | +[ +0.000014] mlxsw_core_bus_device_unregister+0x10a/0x640 |
| 79 | +[ +0.000013] mlxsw_devlink_core_bus_device_reload+0x92/0x210 |
| 80 | +[ +0.000015] devlink_nl_cmd_reload+0x113/0x1f0 |
| 81 | +[ +0.000014] genl_family_rcv_msg+0x700/0xee0 |
| 82 | +[ +0.000013] genl_rcv_msg+0xca/0x170 |
| 83 | +[ +0.000013] netlink_rcv_skb+0x137/0x3a0 |
| 84 | +[ +0.000012] genl_rcv+0x29/0x40 |
| 85 | +[ +0.000013] netlink_unicast+0x49b/0x660 |
| 86 | +[ +0.000013] netlink_sendmsg+0x755/0xc90 |
| 87 | +[ +0.000013] __sys_sendto+0x3de/0x430 |
| 88 | +[ +0.000013] __x64_sys_sendto+0xe2/0x1b0 |
| 89 | +[ +0.000013] do_syscall_64+0xa4/0x4d0 |
| 90 | +[ +0.000013] entry_SYSCALL_64_after_hwframe+0x49/0xbe |
| 91 | + |
| 92 | +[ +0.000017] The buggy address belongs to the object at ffff8881e48e0008 |
| 93 | + which belongs to the cache kmalloc-2k of size 2048 |
| 94 | +[ +0.000012] The buggy address is located 1096 bytes inside of |
| 95 | + 2048-byte region [ffff8881e48e0008, ffff8881e48e0808) |
| 96 | +[ +0.000007] The buggy address belongs to the page: |
| 97 | +[ +0.000012] page:ffffea0007923800 refcount:1 mapcount:0 mapping:ffff88823680d0c0 index:0x0 compound_mapcount: 0 |
| 98 | +[ +0.000020] flags: 0x200000000010200(slab|head) |
| 99 | +[ +0.000019] raw: 0200000000010200 ffffea0007682008 ffffea00076ab808 ffff88823680d0c0 |
| 100 | +[ +0.000016] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000 |
| 101 | +[ +0.000007] page dumped because: kasan: bad access detected |
| 102 | + |
| 103 | +[ +0.000012] Memory state around the buggy address: |
| 104 | +[ +0.000012] ffff8881e48e0300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb |
| 105 | +[ +0.000012] ffff8881e48e0380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb |
| 106 | +[ +0.000012] >ffff8881e48e0400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb |
| 107 | +[ +0.000008] ^ |
| 108 | +[ +0.000012] ffff8881e48e0480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb |
| 109 | +[ +0.000012] ffff8881e48e0500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb |
| 110 | +[ +0.000007] ================================================================== |
| 111 | + |
| 112 | +Fixes: b1569e99c795 ("ACPI: move thermal trip handling to generic thermal layer") |
| 113 | +Reported-by: Jiri Pirko < [email protected]> |
| 114 | +Signed-off-by: Ido Schimmel < [email protected]> |
| 115 | +Acked-by: Jiri Pirko < [email protected]> |
| 116 | +Signed-off-by: Zhang Rui < [email protected]> |
| 117 | + |
| 118 | +Signed-off-by: Vadim Pasternak < [email protected]> |
| 119 | +--- |
| 120 | + drivers/thermal/thermal_core.c | 2 +- |
| 121 | + 1 file changed, 1 insertion(+), 1 deletion(-) |
| 122 | + |
| 123 | +diff --git a/drivers/thermal/thermal_core.c b/drivers/thermal/thermal_core.c |
| 124 | +index 226b0b4aced6..7be7017f0d9e 100644 |
| 125 | +--- a/drivers/thermal/thermal_core.c |
| 126 | ++++ b/drivers/thermal/thermal_core.c |
| 127 | +@@ -402,7 +402,7 @@ static void thermal_zone_device_set_polling(struct thermal_zone_device *tz, |
| 128 | + mod_delayed_work(system_freezable_wq, &tz->poll_queue, |
| 129 | + msecs_to_jiffies(delay)); |
| 130 | + else |
| 131 | +- cancel_delayed_work(&tz->poll_queue); |
| 132 | ++ cancel_delayed_work_sync(&tz->poll_queue); |
| 133 | + } |
| 134 | + |
| 135 | + static void monitor_thermal_zone(struct thermal_zone_device *tz) |
| 136 | +-- |
| 137 | +2.11.0 |
| 138 | + |
0 commit comments